Analysis

  • max time kernel
    133s
  • max time network
    103s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-07-2024 07:50

General

  • Target

    1a7f30f4789938958d5b2ebbbcea4dd2_JaffaCakes118.exe

  • Size

    24KB

  • MD5

    1a7f30f4789938958d5b2ebbbcea4dd2

  • SHA1

    340c1f8752b9a35373a181faa909ca8986e15f21

  • SHA256

    0985ce79dac045bc1a26c7d420e25338d475bdbf7052c798947e3acca41c7d56

  • SHA512

    f03035799f23bf7058b92f66b6f195a7bea8403ebba57c3c62b608c39f70a14884acad743f3697df49b49a4e1d4e7b9808a0f03d8878c2d193f245cfda37a89d

  • SSDEEP

    384:E3eVES+/xwGkRKJvQlM61qmTTMVF9/q5V0:bGS+ZfbJIO8qYoA6

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Gathers network information 2 TTPs 2 IoCs

    Uses commandline utility to view network configuration.

  • Runs net.exe
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1a7f30f4789938958d5b2ebbbcea4dd2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\1a7f30f4789938958d5b2ebbbcea4dd2_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3924
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ver >c:\windows\temp\flash.log & cmd /c set >>c:\windows\temp\flash.log & ipconfig /all >>c:\windows\temp\flash.log & tasklist >>c:\windows\temp\flash.log & net start>>c:\windows\temp\flash.log & netstat -an >>c:\windows\temp\flash.log
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:412
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c set
        3⤵
          PID:4492
        • C:\Windows\SysWOW64\ipconfig.exe
          ipconfig /all
          3⤵
          • Gathers network information
          PID:4740
        • C:\Windows\SysWOW64\tasklist.exe
          tasklist
          3⤵
          • Enumerates processes with tasklist
          • Suspicious use of AdjustPrivilegeToken
          PID:4980
        • C:\Windows\SysWOW64\net.exe
          net start
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:624
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 start
            4⤵
              PID:2228
          • C:\Windows\SysWOW64\NETSTAT.EXE
            netstat -an
            3⤵
            • Gathers network information
            • Suspicious use of AdjustPrivilegeToken
            PID:3108

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • \??\c:\windows\temp\flash.log

        Filesize

        14KB

        MD5

        292bc1906859b04ac4dbee3684ca19ad

        SHA1

        4f567ddf1e1ebdd8ff7e2a1cee73006ebff7803c

        SHA256

        5472fb852c40642441f92f99feae3fbbca6f76c409a99bcf53272b5194a58fdc

        SHA512

        9b6fd1fd4db995ba2f53f6dc96e34ea5098092d5da5373a2cb70a48113a4bf2b2cbdea411806efe94340a0f69d2c62b224899373b4e8ec7cefd4eb192c2fe139